|
Issue |
Title |
|
Vol 20, No 2 (2019) |
An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio |
Abstract
PDF
|
Meng-Fan Xu, Xing-Hua Li, Mei-Xia Miao, Cheng Zhong, Jian-Feng Ma |
|
Vol 16, No 4 (2015) |
Analysis of File Pollution in P2P Networks with Epidemic Model |
Abstract
|
Zhong-Wen Li, Kuan-Ching Li, Yi Xie, Hai Jiang, Liang Shi |
|
Vol 17, No 7 (2016) |
Analysis of Hierarchical Addressing in Different Deployment Ways |
Abstract
|
Xuan Lu, Wendong Wang, Xiangyang Gong, Xirong Que, Bai Wang |
|
Vol 3, No 4 (2002) |
Analysis of Parallel Query Processing Algorithms for Semi-structured Data |
Abstract
|
Wenjun Sun, Kevin Lu |
|
Vol 26, No 1 (2025) |
Analysis of Product Selection Strategy for Cross-Border E-Commerce with Assistance of Artificial Intelligence |
Abstract
|
Lin Feng |
|
Vol 25, No 3 (2024) |
Analysis of Reading Behavior Based on Students’ Cognitive Styles and Learning Styles |
Abstract
|
Juan Zhou, Hideyuki Takada, Chengjiu Yin |
|
Vol 16, No 3 (2015) |
Analysis of SCTP Concurrent Multipath Transfer in Vehicular Network Communication |
Abstract
|
Jing-Yi Gan, Neal Naixue Xiong, Hui-Min Wen, Qing-Zhen Zhu |
|
Vol 21, No 4 (2020) |
Analysis of the New Method for Assessing the Total Network Capacity of Wireless Mesh Networks for IoT Devices |
Abstract
PDF
|
El Miloud Ar-Reyouchi |
|
Vol 21, No 5 (2020) |
Analysis on Parking Sharing Capacity Based on Supply-Demand Relationship |
Abstract
PDF
|
Weiwei Liu, Chennan Zhang, Hao Sun, Jianming Zhang, Gwang-jun Kim |
|
Vol 24, No 3 (2023) |
Analysis on Risk Awareness Model and Economic Growth of Finance Industry |
Abstract
PDF
|
Renyang Wang, Badamasi Sani Mohammed, R. Parthasarathy |
|
Vol 17, No 7 (2016) |
Analytical Model of Adaptive Cross-Layer-Based TCP Congestion Control for Wireless Mobile Cloud Access |
Abstract
|
Ben-Jye Chang, Ying-Hsin Liang, Jun-Yu Jin |
|
Vol 16, No 1 (2015) |
Analyzing Distributed Remote Process Execution Using Queuing Model |
Abstract
|
Susmit Bagchi |
|
Vol 20, No 1 (2019) |
Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group |
Abstract
PDF
|
Jui-Hung Chang, Chien-Yuan Tseng |
|
Vol 11, No 5 (2010) |
Analyzing Mediated Service Protocol Interactions Considering User's Expectation |
Abstract
|
Zhang-Bing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth |
|
Vol 12, No 6 (2011) |
Analyzing Mediated Service Protocol Interactions Considering User's Expectation |
Abstract
|
Zhangbing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth |
|
Vol 24, No 6 (2023) |
Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model |
Abstract
|
Yujie Zhang, Yuyang Hou, Luning Cao, You Xiong, Qian Huang |
|
Vol 19, No 1 (2018) |
Android App Copy Protection Mechanism with Semi-trusted Loader |
Abstract
PDF
|
Kuo-Yu Tsai |
|
Vol 23, No 6 (2022) |
Android Malware Application Detection Method Based on RGB Image Features in E-Commerce |
Abstract
PDF
|
Xingyu Li, Yongli Tang, Mary Subaja Christo, Zongqu Zhao, Ying Li |
|
Vol 3, No 2 (2002) |
Animation Templates for WAP |
Abstract
|
Jyh-Huei Chang |
|
Vol 21, No 3 (2020) |
Anomaly Detection in Crowded Scenes Based on Group Motion Features |
Abstract
PDF
|
Shuqiang Guo, Dongxue Li, Lili Yao |
|
Vol 25, No 3 (2024) |
Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning |
Abstract
|
Wen-Jen Ho, Hsin-Yuan Hsieh, Chia-Wei Tsai |
|
Vol 23, No 4 (2022) |
Anomaly Detection of Dam Monitoring Data based on Improved Spectral Clustering |
Abstract
PDF
|
Lixia Ji, Xiao Zhang, Yao Zhao, Zongkun Li |
|
Vol 10, No 3 (2009) |
Anonymity Scheme for Interactive P2P Services |
Abstract
|
Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni |
|
Vol 15, No 6 (2014) |
Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks |
Abstract
|
Cheng-Yeh Chen, Te-Cheng Hsu, Hsin-Te Wu, John Y. Chiang, Wen-Shyong Hsieh |
|
Vol 10, No 1 (2009) |
Anonymous Authentication for Wireless Access in Internet from Pairings |
Abstract
|
Shyi-Tsong Wu, Jung-Hui Chiu, Bin-Chang Chieu |
|
726 - 750 of 2683 Items |
<< < 25 26 27 28 29 30 31 32 33 34 > >> |